You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

10 March 2020

Refining Network Lifetime of Wireless Sensor Network Using Energy-Efficient Clustering and DRL-Based Sleep Scheduling

,
,
and
1
Department of Information Technology System Development and Management, Nelson-Mandela-AIST, Arusha 23311, Tanzania
2
Faculty of Integrated Technologies, Universiti Brunei Darussalam, Gadong BE 1410, Brunei Darussalam
3
Department of Water Resources and Environmental Science and Engineering, Nelson-Mandela-AIST, Arusha 23311, Tanzania
4
Department of Communication Science and Engineering, Nelson-Mandela-AIST, Arusha 23311, Tanzania
This article belongs to the Special Issue Energy-Efficient Sensing in Wireless Sensor Networks

Abstract

Over the recent era, Wireless Sensor Network (WSN) has attracted much attention among industrialists and researchers owing to its contribution to numerous applications including military, environmental monitoring and so on. However, reducing the network delay and improving the network lifetime are always big issues in the domain of WSN. To resolve these downsides, we propose an Energy-Efficient Scheduling using the Deep Reinforcement Learning (DRL) (E2S-DRL) algorithm in WSN. E2S-DRL contributes three phases to prolong network lifetime and to reduce network delay that is: the clustering phase, duty-cycling phase and routing phase. E2S-DRL starts with the clustering phase where we reduce the energy consumption incurred during data aggregation. It is achieved through the Zone-based Clustering (ZbC) scheme. In the ZbC scheme, hybrid Particle Swarm Optimization (PSO) and Affinity Propagation (AP) algorithms are utilized. Duty cycling is adopted in the second phase by executing the DRL algorithm, from which, E2S-DRL reduces the energy consumption of individual sensor nodes effectually. The transmission delay is mitigated in the third (routing) phase using Ant Colony Optimization (ACO) and the Firefly Algorithm (FFA). Our work is modeled in Network Simulator 3.26 (NS3). The results are valuable in provisions of upcoming metrics including network lifetime, energy consumption, throughput and delay. From this evaluation, it is proved that our E2S-DRL reduces energy consumption, reduces delays by up to 40% and enhances throughput and network lifetime up to 35% compared to the existing cTDMA, DRA, LDC and iABC methods.

1. Introduction

Wireless Sensor Network (WSN) consists of various sensor nodes that are capable of sensing and communicating the data in the monitoring area. WSN proved to be an efficient requirement for the continuous monitoring of hostile areas such as environment monitoring like sudden volcanic eruptions, forest fires, floods and etc. [1,2,3]. The issues of reducing transmission delay and maximizing network lifetime are important research topics in the domain of WSN [4]. In order to reduce energy consumption and maximize network lifetime, two processes are included in WSN—clustering and duty cycling [5].
Cluster formation is one of the significant approaches in WSN to reduce energy consumption [6]. Clustering is a method of combining sensor nodes into clusters with a cluster head. Bio-inspired algorithms such as hybrid Particle Swarm Optimization (PSO) and Gravitational Search Algorithm (GSA) [7], Genetic Algorithm (GA) [8] and Multi-Objective Evolutionary Algorithm (MOEA) [9] are used to select the optimum cluster head in WSN. In hybrid PSO and GSA, the cost function is computed using subsequent parameters such as closeness to the cluster head and residual energy. The cost function is used to allocate the next hop for each cluster head to balance the load among cluster heads. In the HB algorithm, a set of cluster heads is selected from current nodes in the network and forms the clusters based on the cluster heads. In GA, a self-organizing network clustering method is proposed that affords a framework for dynamically optimized wireless sensor node clusters. In MOEA, an efficient cluster head is selected using two evolutionary algorithms such as GA and multi-objective PSO. Fuzzy-based cluster head selection is used [10,11,12] to select the best cluster head among sensor nodes in WSN. Here, the eligibility index is calculated for each sensor node for the election of the cluster head role.
Duty cycling is one of the significant methods to reduce energy consumption in WSN [13,14]. The Energy-aware scheduling with Quality Guarantee (ESQG) method is utilized [15] which aims at reducing sensor nodes’ energy consumption. The ESQG method dynamically adapts each sensor node awakening frequency. Each node dynamically turns on through node awakening probability and node importance. A distributed delay efficient data aggregation scheduling is used [16] for duty-cycled WSN. Here, the fast aggregation scheduling algorithm is used to schedule the sensor nodes. Delay aware tree construction and scheduling are proposed [17] for duty-cycled WSN. A Connected Dominated Set (CDS) tree is constructed for efficient scheduling.
Routing is one of the significant processes to reduce delays during data transmission [18,19]. An energy-efficient scheduling-based cross-layer-based adaptive routing protocol is used [20] for WSN. The proposed routing protocol comprises of two models that include the network model and radio energy model. Energy-efficient clustering using multilevel routing is proposed [21] for WSN. The three different routing mechanisms are hierarchical routing using cluster identification, hierarchical routing using multi-hop and multi-level. A multi-objective hybrid routing algorithm is proposed [22] for WSN. In this, two approaches are used that are the scalarization approach and the lexico-graphical approach. The application of the WSN is evolving day by day owing to its wide range of amenities. However, the restricted power (battery source) of sensor nodes delegates the design of energy-efficient communication protocol for WSN [23].
In general, WSN has three routing protocols for communication, including a flat-based protocol, hierarchical-based protocol and location-based protocol. The flat routing protocols such as SPIN and directed diffusion have issues in scalability, overhead and latency [24]. This is due to the dissemination of information to all the nodes in the network. Besides, it also suffers from high link failures. The hierarchical routing protocols such as LEACH and PEGASIS have problems with the complexity in managing cluster head selection and routing the packets to the sink node [25]. Likewise, location-based routing protocols including GEAR, GAF and SPAN have high energy consumption, limited scalability and high overhead issues in WSN [26]. In addition, these protocols are not concentrated on the optimal cluster head selection while routing the packets. This increases energy consumption and reduces the stability of the WSN.
From the previously mentioned studies, we come to know that WSN still suffers from the issues that are discussed as follows:
  • Energy consumption is still a major problem in the WSN. Most of the works concentrate on clustering to reduce energy consumption. However, it lacks a mechanism for the selection of optimal cluster head. This reduces data aggregation efficiency.
  • The energy consumption of the sensor node is high due to the ineffective duty cycling process.
  • Lack of parameter consideration in scheduling leads to frequent dead sensor nodes in the network.
  • The network delay is high due to distance and energy-based path selection.
To resolve these shortcomings in existing communication protocols in WSN, our Energy-Efficient Scheduling using the Deep Reinforcement Learning (DRL) (E2S-DRL) approach constructs the following objectives:
  • To reduce energy consumption during data aggregation for efficient cluster head selection and clustering in WSN.
  • To schedule the state of the individual sensor node so as to reduce energy consumption.
  • To find an optimal path to deliver the sensed data packet to the sink without routing overhead and delay.
The main aim of our work is to reduce energy consumption and network delay. The major contribution of this paper is summarized as follows:
  • We locate our sensor nodes in the corona field to aggregate data from all sensor nodes effectually and also, we split coronas into zones to reduce energy consumption. To improve network lifetime, our work is based in three phases, namely Zone-based Clustering (ZbC), duty cycling and routing.
  • The first phase reduces energy consumption during data aggregation through the ZbC scheme that comprises a hybrid PSO and the Affinity Propagation (AP) algorithm. PSO computes fitness function for following metrics energy factor and node degree. The energy factor is a combination of residual energy and distance between the source and sink node.
  • The second phase enhances network lifetime through duty cycling. Duty cycling is performed using a DRL algorithm that schedules each sensor node in a distributed manner. Each scheduling slot considers three modes that are sleep, listen and transmit.
  • In the last phase, routing is performed to reduce data transmission delay by finding the best path between source and cluster head. Ant Colony Optimization (ACO) algorithm is used to choose multiple paths between source and cluster head. Here, the ACO algorithm considers the following metrics to compute fitness functions such as residual energy, the distance between the source and the destination node, hop count and bandwidth. From the selected multiple paths, the best path between source and cluster head is selected using the firefly algorithm. The firefly algorithm considers succeeding metrics such as expected delay, packet delivery ratio and load.
The rest of this paper is structured as follows: Section 2 describes the state-of-the-art works related to the energy-efficient scheduling in WSN. Section 3 deliberates the proposed work with the algorithms discussed in detail. Section 4 illustrates the experimental results and comparative analysis. Section 5 discusses the research output. Finally, in Section 6 a conclusion and future work are briefly presented.

3. Proposed Work

Our proposed work enhances network lifetime through energy-efficient scheduling using the DRL algorithm in WSN. Our network comprises static sensor nodes and sink nodes as depicted in Figure 1. We consider our sensing field as three coronas in which sensor nodes are deployed. A sink node is deployed in the center point of the coronas. Each corona is split into four partitions based on the sink node position. Our work is composed of three sequential phases, namely, ZbC, duty cycling and routing. The first phase diminishes energy consumption through data aggregation using the ZbC scheme. In the ZbC scheme, a hybrid PSO and AP algorithm are used to establish clusters in each zone. Herein, PSO is applied to choose the best exemplar for AP using fitness function computation which contemplates succeeding metrics such as node degree, residual energy and distance. Based on the elected exemplar, AP forms clusters in each zone efficiently. The second phase enhances network lifetime through duty scheduling that is accomplished using the DRL algorithm. The proposed scheduling algorithm adaptively changes each sensor node scheduling mode. In the last phase, network delay is minimized via the ACO and FFA algorithms. Here, FFA is used to select the best path from multiple paths selected by ACO.
Figure 1. The architecture of proposed work.
ACO selects multiple paths by considering subsequent parameters that are residual energy, hop count, bandwidth and distance. Firefly Algorithm (FFA) selects the best path by taking into account the following metrics, for instance, expected delay, packet delivery ratio and load.

3.1. Clustering Phase

In WSN, clustering plays a vital role in terms of energy consumption since it minimizes energy consumption during data aggregation. To avoid this problem, we pursue the ZbC scheme that forms an efficient cluster in each zone using hybrid PSO and AP algorithms. The shortcoming of the AP algorithm is that the number of exemplar selections is not effective. To avoid this problem, we combined PSO with AP. The reason for selecting the PSO algorithm is that it has a high probability and efficacy in identifying the global optimal solution. It pursues the intelligence behavior of swarms that provides effective searching results. It is necessary for our proposed AP cluster formation in order to enhance the network lifetime effectually and also reduces the frequent cluster head selection due to earlier death.

3.1.1. PSO based Exemplar Selection

The PSO algorithm operates based on the swarming nature of flocks of birds. In our work, we use the PSO to choose an optimum exemplar for the AP algorithm. The PSO computes the fitness function for subsequent metrics, including node degree, residual energy and distance. The PSO selects an exemplar in each zone to form effective clusters. Here, the node that has the highest fitness function is elected as the exemplar for the AP-based clustering process. The PSO comprises three phases that are (i) initialization, (ii)fitness function evaluation (iii) global best ( G b ) and local best ( L b ) computation. These processes are discussed as follows:
(i)
Initialization
In PSO, each sensor node is considered as a particle that is associated with an initial position, node degree, residual energy and distance.
(ii)
Fitness function computation
In this phase, PSO computes a fitness function for each node by means of succeeding parameters such as node degree, residual energy and distance that are explained as follows:
(I)
Node degree
Node degree is described as the number of neighbor nodes connected to the particular node. This metric selects the node that has the highest node degree that can communicate with more neighbor nodes that tends to increase in network performance. Node degree is represented as ‘ N D ’ that can be conveyed as follows:
N D =   N c ( N i )
where, N c ( N i ) represents the neighbor count of the node N i .
(II)
Residual Energy
Residual energy is described as the difference between total primary energy and consumed energy. Herein, the residual energy metric is used to select the highest energy node to avoid the frequent death of sensor nodes in the network. It is represented as ‘ E r ’ and is expressed as follows:
E r =   E p   E c
where, E p represents total primary energy and E c represents consumed energy.
(III)
Distance
The distance parameter is referred to as the distance between the sensor and the sink node. This metric is also involved in network delay, since the distance is directly proportional to the delay. It is represented as ‘ D i , s ’ and is expressed as follows:
D i , s =   ( ( N s , x N i , x ) 2 + ( N s , y N i , y ) 2 )
where,   N s , x ,   N s , y represents the position of the sink node and ( N i , x , N i , y ) represents the position of the sensor node. By means of the above metrics, PSO computes the fitness function for the exemplar using the following expression [42],
f e =   σ 1 ( E r ) +   σ 2   ( D i , s ) +   σ 3 ( N D )
where,   σ 1 , σ 2   and σ 3 are weightage parameters.
(iii)
Global Best and Local Best Computation
After computing the fitness function for each node, this phase compares each node local best L b with another node to find the global best G b node. This process is continued until the stopping criterion reached. Finally, the optimum node with the highest fitness value is elected as an exemplar for the AP process.

3.1.2. AP Cluster Formation

Based on selected exemplar AP forms clusters, here exemplar nodes are elected by computing the fitness function for each node. Using selected ‘k’ exemplar, AP forms clusters by means of similarity between sensor node N i and exemplar N e that is computed using the following expression,
S i m   ( N e ,   N i ) =   | N e N i | 2
where | N e N i | 2 represent the similarity between N i and N e in terms of Euclidean distance. AP has two matrices that are the responsibility matrix and available matrix. The responsibility matrix and available matrix are updated using a computed similarity. Responsibility matrix ‘ R m ’ is updated as follows:
R m ( N e ,   N i ) = S i m   ( N e ,   N i ) m a x i i   ( A ( e , i ) + s ( e , i ) )
where, A ( e , i ) represents the availability matrix that is expressed as follows:
A ( e , i ) = min ( 0 ,   R m ( N e ,   N i ) ) + i e , i max ( 0 , R m ( N e ,   N i ) )
Using the above two equations, the responsibility matrix and the availability matrix is computed for each sensor node and exemplar node. This process is repeated until possible clusters are formed. Our proposed clustering hybrid algorithm forms effective clusters in each zone that reduces energy consumption through data aggregation.

3.2. Duty Cycling Phase

Duty cycling is one of the significant processes to reduce the energy consumption of WSN. In our work, we proposed the DRL algorithm for duty cycling that adaptively decides each node’s scheduling mode.

DRL-Based Scheduling

The DRL algorithm is utilized to schedule each sensor node’s scheduling modes adaptively. In our work, we divide the time period into the different slots that are allocated to each sensor node. Hence, each sensor node contains a unique slot that tends to avoid data collision between sensor nodes during transmission. In each slot, nodes adaptively change their mode using the DRL algorithm. In our work, we consider three modes in scheduling, which are sleep, listen and transmit that are conveyed as follows:
(a)
Sleep Mode
During sleep mode, each sensor node turns off its radio that reduces the energy consumption of each node which in turn increases the lifetime of the network. A sensor node cannot receive or transmit any data when it is sleeping.
(b)
Listen Mode
In listen mode, each sensor node senses their surrounding field and also receives data from neighbor nodes. During listen mode, a sensor node turns off its transmitter circuitry, hence the transceiver can receive data only.
(c)
Transmit Mode
In transmit mode, each sensor node transmits its sensed data to the sink node and also it transmits data from the neighboring sensor node.
Figure 2 depicts the DRL scheduling of the sensor nodes with three modes such as Transmit (T), Sleep (S) and Receive (R). Each node changes these three modes in each period using the DRL algorithm. In DRL, we adopt deep Q-Learning that comprises of following operations such as actions, states, Q-value, payoff and reward. A deep Q-leaning algorithm learns the environment state information and obtains the best action. The steps involved in DRL scheduling are discussed as follows:
Figure 2. Deep Reinforcement Learning (DRL) scheduling.
(i)
Actions ( A ): In our work, we propose three actions that are Sleep (1), Listen (2) and Transmit (3). Actions are undertaken by each node based on the computed Q-value.
(ii)
States: We propose four states for each node that are S 0 ,   S 1 ,   S 2   and   S 3 . S 0 indicates the node does not have any storage in its buffer B S = 0 . S 1 indicates a node has storage in its buffer as B S B S . S 2 indicates a node has storage in its buffer as B S 4 . S 3 indicates a node has storage in its buffer as B S 2 .
(iii)
Q-value: Q-value is computed to select actions for each node. Here, Q-value is computed using the payoff value of the particular node.
(iv)
Payoff: Payoff value is computed using the probability of the node to select an action. The payoff value is computed for each node to select particular action in each period.
(v)
Reward: Reward is provided to each action on the basis of the successful transmission of packets to the neighbors.
Consider two nodes N i   and N j need to select actions during the allocated period then it determines the payoff value for each node. This payoff value is computed using probability distribution function over actions. If the node N i and N j selects action l and m respectively, then node N i receives payoff N i l . m and node N j obtains payoff   N j l , m . Let α 1 α 3 , denote probability for node   N i ’ to select actions 1 to 3 where   α 1 + α 2 + α 3 = 1 . Let β 1 - β 3 denote probability for node   N j ’ to select actions 1 to 3 where   β 1 + β 2 + β 3 = 1 . The node N i expected payoff is represented as:
P N i   =   1 l 3 ( 1 m 3 N i l , m α l β l )
The node N j expected payoff is represented as,
P N j   =   1 l 3 ( 1 m 3 N j l , m α m β m )
where payoff values N i l . m and N j l . m for nodes N i   and N j are defined as the energy utilized by each node. This energy represents the remaining energy of the node which is calculated using Equation (2). The reward is given to each node if the packet is successfully transmitted that is represented as   . This factor is included in energy consumption only if the packet is successfully transmitted.
For example, if node N i has packets to transmit, selects transmit action, then node N j selects the listen action that induces packets that are successfully transmitted. Here, payoffs for both nodes are positive, which can be calculated using energy consumed to transmit/receive packet plus reward constant   . In the transmit state node N i intends to transmit a packet that consumes energy σ e i and N j consumes energy σ e j to receive packets. Then, the payoff for node N i   is σ e i + = P N i and the payoff for node N j is σ e j + = P N j . This way of packet transmission reduces collision effectually.
The Q-value is computed using the following equation,
Q ( S , A ; θ ) =   E ( i , +   δ 2 +   δ   2   3 + )
where δ represents the discount rate for action and θ is weight parameter. The discount rate determines the importance of future rewards. The value of the discount rate relies on the range of [0 to 1]. Thus, δ = 0 , represents that a node is biased in current rewards whereas δ = 1 represents that a node achieves a high reward. The deep Q-learning learns the parameter θ of the action function Q ( S , A ; θ ) by minimizing sequence of the loss function, where ith loss function L i ( θ i ) is given by,
L i ( θ i ) =   E [ n +   m a x A n + 1   Q ( S n + 1 , A n + 1 ; θ i 1 ) Q ( S n , A n ; θ i ) ]
where, θ i is the neural network parameter at ith update and parameters from the previous update θ i 1 are held to be fixed during the optimizing of the loss function   L i ( θ i ) . The term n +   m a x A n + 1   Q ( S n + 1 , A n + 1 ; θ i 1 ) Q ( S n , A n ; θ i ) is the target for iteration i that depends on the neural network parameters from the last update. Differentiating the loss function with respect to the neural network parameter at iteration i, θ i gives the upcoming gradient,
θ i L i ( θ i ) = E [ n +   m a x A n + 1   Q ( S n + 1 , A n + 1 ; θ i 1 )   Q ( S n , A n ; θ i ) θ i Q ( S n , A n ; θ i ) ]
where, θ i represents gradient of θ i .
Algorithm 1. Node Scheduling
Require: Energy and Buffer of Node
Ensure: Selected Mode of Operation for Node
I n i t i a l i z e     replay memory D to the capacity ‘C’
Initialize     Q network with random weights   θ .
Initialize     target Q network with random weights   θ = θ
for ( S i < S   & &   A i < A ) do
 {
 payoff 𝒫 select   action A ;
 payoff 1- 𝒫 select A n maximizes S , A ; θ ;
 }
Execute   action A n to obtain reward n and S n + 1
Store ( A n ,   S n ,   S n + 1 ,     n ) D
If (n==n+1)
 Set target n ;
Else
 Set target n +   m a x A n + 1   Q ( S n + 1 , A n + 1 ; θ ) ;
Update θ θ ;
End for
Algorithm 1 describes how the proposed work that selects the mode of operation (Transmit (T), Sleep (S) and Receive (R).) for each node in each time slot. Initially, reply memory   D , weight θ   and random weight parameters θ   are initialized. At first, the node selects an action that depends on the probability distribution over three actions sleep, listen and transmit respectively in the current state. A node carries out the selected action and observes the reward and new state. The node adjusts the probability distribution over three actions in the state S based on the payoff. In each iteration, θ the target parameter is updated effectually. In this way, we schedule each sensor node in the network that tends to reduce collision and also reduces the energy consumption of the sensor node.
In order to avoid divergence of the DRL, two techniques are introduced that are experience replay and the fixed target network. Using these techniques, DRL minimizes the loss function,
L i ( θ i ) =   E S n , , A n , n , S n + 1 ~ D [ n +   m a x A n + 1   Q ( S n + 1 , A n + 1 ; θ   ) Q ( S n , A n ; θ i ) ]
where D   denotes experience replay memory and θ   are the parameters of the target Q-network. Using these equations, a deep Q-learning algorithm adaptively changes each node’s action effectually.

3.3. Routing Phase

Transmission delay is more in WSN due to inefficient path selection between the source and the sink node. To address the transmission delay problem, the ACO and FFA algorithm-based routing is proposed. Multipath selection reduces delay in data transmission between source cluster member (CM) and exemplar. Hence, we first select multiple paths between CM and exemplar using ACO. From the selected multipath, an optimum path is selected using FFA. The description of ACO and FFA algorithms can be discussed as follows:

3.3.1. ACO Algorithm

The proposed ACO algorithm selects the multiple paths between the source and destination nodes. The reason behind selecting this algorithm for multipath selection is that it provides a better searching behavior among the population in parallel. It provides an optimal solution rapidly by using the effective pheromone function. This pheromone function has benefits in the selection of multiple paths between the source and destination. The ACO algorithm follows the ants’ behavior which has the habit of pheromone evaporation during moving. Thus, it increases the probability of finding an optimal path during moving. With the aid of this pheromone behavior, the ACO algorithm estimates the pheromone function that tends to yield an effective solution in path estimation. Hence, we selected this algorithm for multiple path selection between source and destination. The ACO algorithm works on the basis of real ant behavior. The ACO algorithm computes the fitness function using subsequent parameters such as hop count, bandwidth, residual energy and distance. In ACO, the multipath is selected based on the pheromone value of each node. Pheromone value is updated in each iteration to discover the best path between the source CM and the exemplar. Pheromone value is computed using the following parameters that are explained as follows:
(i)
Hop Count
Hop count is described as the number of nodes between source CM and exemplar. This metric is used to reduce delays in data transmission since delays tend to increase the energy consumption of the sensor node. It is represented as ‘ H c ’ that is explained as follows:
  H c = N c ( N C M i , N e )
where, N c ( N C M i , N s ) represent the hop count between source cluster member node N C M i and exemplar   N e .
(ii)
Distance
The distance parameter is referred to as the distance between the source cluster member and the exemplar node. This metric also involved in network delay, since the distance is directly proportional to the delay. It is represented as ‘ D C M i , e ’ that can be computed as same as Equation (3).
(iii)
Bandwidth
The bandwidth parameter is considered in order to know the capacity of the link. Typically, bandwidth is measured in terms of bits per second. The bandwidth metric is used to select the best path to route the sensed data. It is represented as ‘ B p ’ that is expressed as follows:
B p = b n s
where, b n indicates the number of bits and s indicates seconds.
In proposed ACO algorithm ants are working based on two rules. They are named as the initial rule and revising rule. These rules are briefly explained as follows:
(a)
Initial Rule
In this rule probability of selecting a path is computed using the pheromone. The pheromone function is computed using fitness value and pheromone intensity. At first, ACO computes fitness values for each node to elect multiple paths between the source CM and the exemplar node. The fitness value V f is computed using the expression below:
V f =   E r + H c + B p + 1 D i , s
The expression above is composed of all computed parameters such as residual energy, hop count, distance and bandwidth. By means of computed fitness value, ACO further computes pheromone for each path for data transmission. The pheromone function ‘ P f ’ is computed using the following expression:
P f =   τ i , j α V f β i = 0 n τ i , j α V f β
where, τ i , j indicates pheromone intensity, α and β are control parameters. The probability of selecting the path between the source CM and the exemplar node is expressed as follows:
ρ k =     α + [ P f ] β i = 0 n α + [ P f ] β
The expression above indicates the probability of selecting a path as the transmission path between the source CM and the exemplar node.
(b)
Revising rule
In this rule, the pheromone is updated in each iteration using the following expression,
τ i , j ( t + 1 ) = ( 1 ε ) τ i , j ( t ) +   ε τ i , j ( t )
where ε represents local pheromone corrosion and τ i , j ( t ) represents pheromone enhancement. By means of updating pheromone values in each iteration, ACO discovers multiple paths between the source CM and the exemplar node.

3.3.2. FFA

From the selected multiple paths, FFA elects the best path between source CM and exemplar. FFA works on the principle of the flashing lights of fireflies. The reason behind selecting this algorithm for the best pathfinding is that it can generate an optimal result with a fast convergence rate and also provides better results with the aid of an attractiveness function. Here, the attractiveness degree of this algorithm is used to obtain the optimal solution in path selection between source and destination even under non-linear, high-density conditions. Hence, we select the firefly which has high attractiveness as the optimal path routing. Hence, we select this algorithm for optimal pathfinding in the WSN environment. Here, FFA computes the fitness function for succeeding metrics such as packet delivery ratio, expected delay and load.
(a)
Packet Delivery Ratio
The packet delivery ratio is described as the ratio between the number of packets successfully transmitted by the source node and the number of packets successfully received by the exemplar node. It is expressed ‘ 𝕕 r ’ as follows:
𝕕 r = p s p r
where p s represents packets successfully transmitted and p r indicates packets successfully received.
(b)
Expected Delay
The expected delay is described as the time required to transmit data from the source to the destination node. This parameter is taken to measure the delay in the selected path, since it affects the energy consumption of the network. It is represented as ‘ E d ’ that is expressed as follows:
E d = T ( N C M i ,   N e )
where T ( N C M i ,   N e ) represents the time required to transmit data between the source CM node   N C M i and the exemplar node   N e .
(c)
Load
The load parameter is used to measure the load of each sensor node in the network. The load parameter increases automatically as energy consumption also increases. This parameter is expressed as ‘ N L ’ and can be conveyed as follows:
N L = L ( N i )
where L ( N i ) represents the load of the node N i .
FFA computes the fitness function for each node to find an effective path between the source CM and the exemplar node. The fitness function f ( x ) is expressed as follows:
f ( x ) =   1 E d + N L +   D r  
The light intensity of each node is computed using the above-explained fitness function   f ( x ) . Light intensity ‘ I l ’ is expressed as follows:
I l =   I o   e γ r
where I o   indicates the original light intensity and   γ represents the light absorption coefficient. The firefly that has the highest attractiveness function is selected as the optimal path between the source and destination. Here, attractiveness is represented as the brightness of the firefly which represents the path that is best among other paths between the source and destination. The attractiveness of FFA is computed using the expression below,
ω =   ω 0 e γ r 2
where, ω 0 indicates attractiveness at r = 0. Here, the firefly moves to the best position from i to j by using the below expression,
N i = N i +   ω 0 e γ r 2 ( N j N i ) +   δ   ( r a n d 1 2 )  
By using the above function, the firefly discovers the optimum path between the source CM and the exemplar node. With the aid of the proposed FFA, we find out the optimal path between the source and destination in the WSN environment. From the above process, our work effectually reduces network delay that in turn enhances network lifetime.

4. Performance Evaluation

In this section, we evaluate the performance of the E2S-DRL with existing methods using network lifetime, energy consumption, throughput and delay metrics. This section is further divided into three sections: simulation environment, performance metrics and comparative analysis. We compare our proposed work performances with existing methods.

4.1. Simulation Environment

Our proposed work is implemented in the Network Simulator 3 (NS3) tool, implemented in the Ubuntu operating system. NS3 is a discrete event simulator that provides simulations of different types of network; hence we preferred this simulator for proposed energy-efficient sleep scheduling in the WSN environment.
Figure 3 illustrates the simulation environment of the proposed work. Our simulation environment is composed of 100 sensor nodes that are deployed in the three coronas. We position the sink node at the center of coronas; based on the sink node position each corona is further split into zones. Zones comprise clusters in which each cluster contains one cluster head respectively.
Figure 3. Simulation environment of our work.
Table 2 illustrates the parameters used in our simulator. We position 100 sensor nodes in the 1000 * 1000 simulation area. The positioned sensor nodes have a 100 m communication range to transmit sensed information to neighbor nodes.
Table 2. Simulation parameter.

4.2. Performance Metrics

We evaluate the performance of our work using performance metrics such as network lifetime, energy consumption, throughput and delay that are summarized in the following sections.

4.2.1. Network Lifetime

Network lifetime metric is used to measure the lifetime of the sensing network. Typically, network lifetime is referred to as the time at which the first node dies in the network. It is also defined as the operational time of the node during which it can be able to perform the allocated task. Network lifetime is represented as ‘ 𝓃 that can be conveyed as follows:
𝓃 = 𝓌 𝓮 C p + a 𝓇 e
where denotes initial energy of the network, 𝓌 𝓮 denotes wasted energy, C p denotes continuous power consumption of the network, a 𝓇 represents average sensor reporting rate and e represents estimated reporting energy.

4.2.2. Energy Consumption

Energy consumption metric is described as the amount of energy consumed over sensing, data transmitting and data receiving in the network. It is represented as E that is represented as follows:
E =   D t +   D r +   𝕤 f
where D t represents the energy consumed during data transmission, D r represents the energy consumed during data receiving and 𝕤 f represents the energy consumed during sensing the field.

4.2.3. Throughput

The throughput metric is described as the number of packets successfully received by the receiver in the given amount of time. It is represented as ‘ T ’ that is conveyed as follows:
T =   i = 1 n p i p s ( t )
where p i represents the number of packets in node ‘i’, p denotes data packet length and s ( t ) represents simulation time.

4.2.4. Delay

Delay is defined as the time required to deliver sensed data from the source to the destination node. It is represented as ‘ O ’ that is conveyed as follows:
O = T s T d
where T s   represents the time required to send data and T d represents data received by the destination node.

4.3. Comparative Analysis

In this section, we compare our proposed work’s performance with the existing methods LDC [43], iABC [27], cTDMA [35] and DRA [42] methods. The contributions of these methods are similar to the contribution of the E2S-DRL work in WSN. Hence, we select these methods to compare our proposed work. From this comparison, we show our proposed work is more efficient than the existing methods that are discussed above.

4.3.1. Analysis of Network Lifetime

A network lifetime metric is a significant metric to analyze the performance of the proposed work. It demonstrates the efficiency of our proposed work in terms of the lifetime of the network. In our work, the network lifetime metric is measured by the number of nodes or simulation time.
Figure 4 shows that the proposed work achieves a high network lifetime compared to the existing methods DRA, LDC, iABC and cTDMA. The proposed duty cycling method achieves better network lifetime through reduce energy consumption, it provides sleep scheduling to the sensor nodes adaptively using the DRL algorithm. Furthermore, the ZbC method improves energy consumption via reduced energy consumption during data aggregation.
Figure 4. Comparison of network lifetime vs. the number of nodes.
Our method achieves a maximum of 6780 rounds of network lifetime in presence of 100 nodes. Meanwhile, the existing methods, iABC and cTDMA, achieve the minimum network lifetime for 100 nodes. Here, the cTDMA and DRA methods have a minimum lifetime of 4600 rounds for 100 nodes compared to the other existing methods.
Figure 5 illustrates network lifetime with respect to the simulation time that demonstrates our proposed work achieves better network lifetime compared to the existing methods DRA, LDC, iABC and cTDMA. The iABC method achieves the minimum network lifetime compared to the E2S-DRL, because the iABC method takes more objective functions to select the optimum cluster head and it also lacks the use of secondary information. The cTDMA method has a minimum network lifetime compared to the E2S-DRL method since it cannot change the scheduling slot dynamically, which reduces the energy of each sensor node drastically. Likewise, the LDC and DRA method has a low network lifetime compared to the E2S-DRL method due to the lack of concentration on the energy metric of the sensor nodes. These drawbacks pull down the network lifetime minimum for DRA, DRA, iABC and cTDMA methods. Network lifetime is decreased dramatically when simulation time increases. Our method achieves a maximum average network lifetime of 6720 rounds for 100 sec of simulation time whereas the existing methods DRA, LDC, iABC and cTDMA minimum average network lifetime is 5430 rounds, 5630 rounds, 5650 rounds and 4870 rounds for 100 sec of simulation time respectively.
Figure 5. Comparison of network lifetime vs. simulation time.

4.3.2. Analysis of Energy Consumption

Energy consumption is an important metric to improve the lifetime of the network. Since it is inversely proportional to the network lifetime, if the energy consumption of the network increases, then the lifetime of the network automatically decreases drastically. Thus, the energy consumption metric is reduced as much as possible in the network. In our network, the energy consumption of the network is measured with the number of nodes or simulation time.
Figure 6 illustrates the energy consumption with respect to the number of nodes, thus concluding that our work achieves better energy consumption compared to the existing methods like LDC, cTDMA, iABC and DRA. We deploy sensor nodes in the coronas field to support data aggregation efficiently, which reduces energy consumption. In addition, we furthermore reduce energy consumption through duty cycling and ZbC schemes. In duty cycling, the DRL algorithm is proposed, which provides scheduling slots for each sensor node based on the energy and states. The ZbC scheme reduces energy consumption through effective cluster head selection since the optimum cluster head can reduce energy consumption in data aggregation. These processes reduce the energy consumption of the network effectually. Our method achieves a minimum of 200 J and a maximum of 850 J for 100 nodes. The DRA method consumes more energy, it consumes a maximum of 1800 J for 100 nodes compared to the other existing methods.
Figure 6. Comparison of energy consumption vs. the number of nodes.
Figure 7 demonstrates energy consumption with respect to the simulation time, thus concluding that our method achieves a reduced energy consumption compared to the simulation time. The DRA method has more energy consumption, since it does not elect an optimum cluster head to transmit sensed data. Meanwhile, the iABC method also consumes more energy due to its objective function evaluation. Likewise, LDC and cTDMA methods are achieved high energy consumption. The reason for this is that these methods do not concentrate on proper slot allocation for the sleep and wakeup periods of the sensor nodes. These drawbacks lead to more energy consumption of DRA and iABC methods. Our proposed method achieves the average energy consumption of 583 J for 100 s of simulation time. Whereas, LDC, cTDMA, DRA and iABC methods consume average energy of 842J, 890J, 920 J and 757 J for 100 s of simulation time respectively. From the comparative results, we conclude that our work achieves better energy consumption compared to the existing cTDMA, LDC iABC and DRA methods.
Figure 7. Comparison of energy consumption vs. simulation time.

4.3.3. Analysis of Throughput

The throughput metric is related to the performance of the proposed network. Hence, throughput is increased as much as possible in our work. In performance evaluation, the throughput metric is measured using the number of nodes or the number of rounds.
Figure 8 describes how our proposed work produces high throughput compared to the existing methods such as DRA, LDC, iABC and cTDMA. In existing methods like iABC and cTDMA loose data packets are in transmission due to poor path selection between the source and the sink node. Likewise, DRA and LDC methods do not concentrate on the buffer-related and link-related metrics to route the data packet, thus reducing the throughput of the WSN effectually. Hence, we propose an effective routing method that efficiently reduces data packet loss through minimizing delay in the network. The delay of the network is reduced through an effective selection of paths between source and destination. Here, we pursue ACO and FFA to select an optimum path between the source and destination. The ACO selects multiple paths between source and destination, from which FFA elects the best path between the source and destination. This way of selecting a path diminishes delay effectually that in turn improves the throughput of the proposed work. Our work achieves a maximum of 91% throughput for 100 nodes. Meanwhile, DRA achieves a maximum of 68%, LDC achieves a maximum of 50%, iABC achieves a maximum of 70% and cTDMA achieves a maximum of 79% for 100 nodes. Thus, our results show that our proposed work achieves better throughput that in turn improves the performance of the network.
Figure 8. Comparison of throughput.

4.3.4. Analysis of Delay

The delay metric is significant for improving the lifetime of the network since it is directly proportional to the energy consumption and network lifetime metric. Thus, our work reduces delay as much as possible. Usually, the delay metric is measured using the number of nodes or the number of rounds.
Figure 9 demonstrates that the delay of proposed work is minimal compared to the existing methods LDC, cTDMA, iABC and DRA. If the number of nodes increases, the automatic delay also increases. The above comparison clearly shows that our work transmits packets with minimum delay. Our scheduling scheme reduces delay by allocating slots based on the packets in its buffer. Furthermore, the delay is reduced through effective path selection between source and destination. Here, ACO selects multiple paths between source and destination and FFA selects the best path among multiple paths that in turn reduces delay effectively. Our method achieves a minimum of 240 ms for 100 nodes. The cTDMA and DRA methods have poor data transmission, since it has a maximum delay of 450 and 480 ms for 100 nodes, respectively, due to the lack of consideration of distance- and buffer-related metrics for comparison. Likewise, iABC and LDC methods also acquire high delay as 400 ms for 100 nodes. It is due to the slow processing performance of the utilized algorithms. From the above comparison, we conclude that our method achieves better data transmission with minimum delay in the network.
Figure 9. Comparison of delay.

4.3.5. Memory Consumption Analysis

In this section, we analyze the performance of the proposed work with memory consumption. Here, we have also compared the memory consumption of the proposed work with the existing methods including iABC, LDC, DRA and cTDMA. It is measured with the aid of varying the number of nodes in the network.
As represented in Figure 10, our E2S-DRL achieves better results in memory or space consumption compared to the other existing methods. This is achieved because of our proposed algorithms for clustering, duty cycling and routing. Our proposed algorithms, including PSO-AP, DRL and ACO-FFA, are consuming less memory to select the optimal cluster head, mode of operation and optimal path. Our routing selects the path with high energy and minimum delay to transmit data to the destination. Hence this reduces the memory consumption of the sensor node effectually. Meanwhile, the existing methods acquire high memory consumption due to its poor processing performance of the selected algorithms. It leads to high memory consumption in each sensor node in the network. Our method reduces 40% in memory consumption compared to the existing methods including iABC, DRA, cTDMA and LDC.
Figure 10. Comparison of memory or space analysis.

4.3.6. Computational Complexity Analysis

This portion discusses the performance of the proposed work in terms of complexity. Here, we compare the time complexity of the proposed optimization algorithm and reinforcement algorithm with the existing iABC and cTDMA algorithms.
From Table 3, we proved that the computation complexity of the ES-DRL is less than the other existing methods present in the clustering, duty cycling and routing. In clustering, the existing iABC has O(2*P/2*D*I2) where P represents the number of population, D represents the dimension and I represents the number of iteration. Meanwhile, our E2S-DRL has less complexity as O(P*I+n2). For duty cycling, cTDMA has a time complexity of three times the number of operations to be performed i.e., 3O(n). Here, the n represents the number of operations. Our proposed E2S-DRL has only O(n) operations to perform duty cycling. Likewise, LEACH routing has the nO(L) operations to complete the routing in WSN where our proposed E2S-DRL only consumes O(n2+nlogn) time to complete the routing. From the above analysis, we conclude that our proposed E2S-DRL achieves less computational complexity compared to the existing algorithms.
Table 3. Time complexity analysis.

5. Discussion

This portion discusses the highlights of the E2S-DRL work in terms of improving the network lifetime and network delay. To attain this, our E2S-DRL proposed three phases: clustering, duty cycling and routing. The advantages of proposing these phases are listed as follows:
  • Clustering: In this phase, we mitigate the energy consumption that occurred during the aggregation of the data in the cluster head node. In cluster-based WSN, energy consumption during data aggregation is a big issue that leads to frequent cluster head election. These problems are resolved in our proposed clustering by selecting an optimal cluster head for data aggregation based on the effective parameters.
  • Duty Cycling: This phase reduces the energy consumption of the individual sensor node by exploiting the DRL algorithm. Using this algorithm, each sensor node in the network decides its mode of operation perfectly. Using this, the proposed method reduces the energy consumption of the individual node effectively.
  • Routing: The network delay is one of the significant issues in the WSN; it reduces the performance of the proposed system. To attain less network delay, our E2S-DRL method performs the multiple paths based on optimal path selection in WSN. It initially selects the multiple paths between source and destination node. From the selected multiple paths, our E2S-DRL chooses a better path to transmit the sensed data packet to the destination. This reduces the delay incurred during the data transmission between the source and sink node.
The algorithms incorporated in the aforesaid phases are discussed with their benefits in terms of the performance metrics in Table 4.
Table 4. Benefits of the proposed algorithms.
The performance of the proposed work is compared with the performance of the existing methods including iABC, cTDMA, DRA, MPACO and LDC with the average results acquired for the following metrics: network lifetime, energy consumption, throughput and delay. The numerical results obtained from the E2S-DRL and existing methods are deliberated in the Table 5. From this comparison, it is perceived that our proposed E2S-DRL algorithm attains better performance compared to the proposed methods. Here, #N represents the number of nodes and S.T represents the simulation time.
Table 5. Numerical results of proposed work.

6. Conclusions and Future Work

To date, reducing the energy consumption and network delay in WSN is essential due to its evolving applications. To improve network lifetime and reduce the network delay, we propose energy-efficient sleep scheduling using the DRL algorithm (E2S-DRL). Our proposed method comprises three major phases, clustering, duty cycling and routing. In the first phase, the clustering operation is functioned via the ZbC scheme that is executed through a hybrid PSO and AP algorithm that reduces energy consumption during data aggregation. Here, PSO is used to select the optimal exemplar to form the AP clusters. In the duty cycling phase, the DRL algorithm is proposed that effectively schedules each node based on the energy and state adaptively that in turn improves network lifetime via reduced energy consumption and also reduces data collision among sensor nodes. The routing is adopted to reduce the network delay that is executed by employing ACO and FFA. Here, the ACO selects the multiple paths between source and destination node. From the multiple paths, the FFA selects the optimal path to transmit the packet to the sink node. At last, we evaluate our proposed work performance with existing methods like LDC, iABC, cTDMA and DRA using network lifetime, throughput, energy consumption and delay metrics. It is concluded that our method reduces 40% in delay and energy consumption and increases 35% in network lifetime and throughput compared to the existing methods.
In the future, we intend to propose mobile sink-based data aggregation in WSN in order to improve the performance of the sensor nodes. Besides, we also concentrate on application scenario-based research in WSN i.e., forest fire monitoring and air pollution monitoring.

Author Contributions

Conceptualization, R.S. and S.K.; methodology, R.S.; software, R.S. and F.B; validation, R.S., S.K. and F.B.; investigation, R.S., S.K. and F.B.; writing—original draft preparation, R.S.; writing—review and editing, R.S., F.B., S.K. and K.N; visualization, R.S.; supervision, K.N. and S.K; project administration, K.N.; funding acquisition, R.S. and K.N. All authors have read and agreed to the published version of the manuscript.

Funding

This research was partially supported by Doctoral Environmental Management Information Systems (DEMIS) project, which was funded by DAAD, grant number 57142907.

Acknowledgments

We acknowledge support given by the following institutions: Nelson Mandela African Institution of Science and Technology (NM-AIST), Carleton University, University of Ghana (UG), Oldenburg University, African Development Bank, International Development Research Center (IDRC), Universities Canada, German Academic Research Exchange (DAAD) Service and Queen Elizabeth II Diamond Jubilee Scholarship – Advances Scholars.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Verma, S.; Sood, N.; Sharmam, A.K. Design of a novel routing architecture for harsh environment monitoring in heterogeneous WSN. IET Wirel. Sens. Syst. 2018, 8, 284–294. [Google Scholar] [CrossRef]
  2. Zeng, M.; Huang, X.; Zheng, B.; Fan, X.-X. A Heterogeneous Energy Wireless Sensor Network Clustering Protocol. Wirel. Commun. Mob. Comput. 2019, 2019, 1–11. [Google Scholar] [CrossRef]
  3. Huang, M.; Liu, A.; Xiong, N.; Wang, T.; Vasilakos, A.V. A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems. IEEE Trans. Syst. Man Cybern. Syst. 2018, 49, 317–332. [Google Scholar] [CrossRef]
  4. Lu, Y.; Zhang, T.; He, E.; Comsa, I.-S. Self-Learning-Based Data Aggregation Scheduling Policy in Wireless Sensor Networks. J. Sens. 2018, 2018, 1–12. [Google Scholar] [CrossRef]
  5. Huang, M.; Liu, A.; Zhao, M.; Wang, T. Multi working sets alternate covering scheme for continuous partial coverage in WSNs. Peer-to-Peer Netw. Appl. 2018, 12, 553–567. [Google Scholar] [CrossRef]
  6. Karthick, P.T.; Palanisamy, C. Optimized cluster head selection using krill herd algorithm for wireless sensor network. Automatika 2019, 60, 340–348. [Google Scholar] [CrossRef]
  7. Morsy, N.A.; Abdelhay, E.H.; Kishk, S.S. Proposed Energy Efficient Algorithm for Clustering and Routing in WSN. Wirel. Pers. Commun. 2018, 103, 2575–2598. [Google Scholar] [CrossRef]
  8. Yuan, X.; Elhoseny, M.; El-Minir, H.K.; Riad, A.M. A Genetic Algorithm-Based, Dynamic Clustering Method towards Improved WSN Longevity. J. Netw. Syst. Manag. 2016, 25, 21–46. [Google Scholar] [CrossRef]
  9. Elhabyan, R.; Shi, W.; St-Hilaire, M. A Pareto optimization-based approach to clustering and routing in Wireless Sensor Networks. J. Netw. Comput. Appl. 2018, 114, 57–69. [Google Scholar] [CrossRef]
  10. Mehra, P.S.; Doja, M.N.; Alam, B. Fuzzy based enhanced cluster head selection (FBECS) for WSN. J. King Saud Univ. Sci. 2020, 32, 390–401. [Google Scholar] [CrossRef]
  11. Hamzah, A.; Shurman, M.; Al-Jarrah, O.; Taqieddin, E. Energy-Efficient Fuzzy-Logic-Based Clustering Technique for Hierarchical Routing Protocols in Wireless Sensor Networks. Sensors 2019, 19, 561. [Google Scholar] [CrossRef] [PubMed]
  12. Mothku, S.K.; Rout, R.R. Adaptive Fuzzy-Based Energy and Delay-Aware Routing Protocol for a Heterogeneous Sensor Network. J. Comput. Netw. Commun. 2019, 2019, 1–11. [Google Scholar] [CrossRef]
  13. Ghrab, D.; Jemili, I.; Belghith, A.; Mosbah, M. Context-aware medium access control protocols in wireless sensor networks. Internet Technol. Lett. 2018, 1, e43. [Google Scholar] [CrossRef]
  14. Niu, B.; Qi, H.; Li, K.; Liu, X.; Xue, W. Dynamic scheming the duty cycle in the opportunistic routing sensor network. Concurr. Comput. Pract. Exp. 2017, 29, e4196. [Google Scholar] [CrossRef]
  15. Xiao, K.; Wang, R.; Deng, H.; Zhang, L.; Yang, C. Energy-aware Scheduling for Information Fusion in Wireless Sensor Network Surveillance. Inform. Fusion 2018, 48, 95–106. [Google Scholar] [CrossRef]
  16. Kang, B.; Nguyen, P.K.H.; Zalyubovskiy, V.; Choo, H. A Distributed Delay-Efficient Data Aggregation Scheduling for Duty-Cycled WSNs. IEEE Sens. J. 2017, 17, 3422–3437. [Google Scholar] [CrossRef]
  17. Le, D.T.; Lee, T.; Choo, H. Delay-aware tree construction and scheduling for data aggregation in duty-cycled wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2018, 2018, 95. [Google Scholar] [CrossRef]
  18. Yarinezhad, R.; Hashemi, S.N. A routing algorithm for wireless sensor networks based on clustering and an fpt-approximation algorithm. J. Syst. Softw. 2019, 155, 145–161. [Google Scholar] [CrossRef]
  19. Chithaluru, P.; Tiwari, R.; Kumar, K. AREOR–Adaptive ranking based energy efficient opportunistic routing scheme in Wireless Sensor Network. Comput. Netw. 2019, 162, 106863. [Google Scholar] [CrossRef]
  20. Singh, R.; Verma, A.K. Energy efficient cross layer based adaptive threshold routing protocol for WSN. AEU Int. J. Electron. Commun. 2017, 72, 166–173. [Google Scholar] [CrossRef]
  21. Muthukumaran, K.; Chitra, K.; Selvakumar, C. An energy efficient clustering scheme using multilevel routing for wireless sensor network. Comput. Electr. Eng. 2018, 69, 642–652. [Google Scholar]
  22. Kulkarni, N.; Prasad, N.R.; Prasad, R. Q-MOHRA: QoS Assured Multi-objective Hybrid Routing Algorithm for Heterogeneous WSN. Wirel. Pers. Commun. 2017, 100, 255–266. [Google Scholar] [CrossRef]
  23. Bhardwaj, R.; Kumar, D. MOFPL: Multi-objective fractional particle lion algorithm for the energy aware routing in the WSN. Pervasive Mob. Comput. 2019, 58, 101029. [Google Scholar] [CrossRef]
  24. Lahane, S.R.; Jariwala, K.N. Network Structured Based Routing Techniques in Wireless Sensor Network. In Proceedings of the 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, 6–9 April 2018. [Google Scholar]
  25. Fei, X.; Wang, Y.; Liu, A.; Cao, N. Research on Low Power Hierarchical Routing Protocol in Wireless Sensor Networks. In Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 21–24 July 2017. [Google Scholar]
  26. Li, A.; Chen, G. Clustering Routing Algorithm Based on Energy Threshold and Location Distribution for Wireless Sensor Network. In Proceedings of the 2018 37th Chinese Control Conference (CCC), Wuhan, China, 25–27 July 2018. [Google Scholar]
  27. Mann, P.S.; Singh, S. Optimal Node Clustering and Scheduling in Wireless Sensor Networks. Wirel. Pers. Commun. 2018, 100, 683–708. [Google Scholar] [CrossRef]
  28. Nguyen, T.; Pan, J.; Dao, T. A Compact Bat Algorithm for Unequal Clustering in Wireless Sensor Networks. Appl. Sci. 2019, 9, 1973. [Google Scholar] [CrossRef]
  29. Mosavvar, I.; Ghaffari, A. Data Aggregation in Wireless Sensor Networks Using Firefly Algorithm. Wirel. Pers. Commun. 2018, 104, 307–324. [Google Scholar] [CrossRef]
  30. Kang, J.; Sohn, I.; Lee, S.H. Enhanced Message-Passing Based LEACH Protocol for Wireless Sensor Networks. Sensors 2018, 19, 75. [Google Scholar] [CrossRef]
  31. Kozłowski, A.; Sosnowski, J. Energy Efficiency Trade-Off between Duty-Cycling and Wake-Up Radio Techniques in IoT Networks. Wirel. Pers. Commun. 2019, 107, 1951–1971. [Google Scholar] [CrossRef]
  32. Du, Y.; Xu, Y.; Xue, L.; Wang, L.; Zhang, F. An Energy-Efficient Cross-Layer Routing Protocol for Cognitive Radio Networks Using Apprenticeship Deep Reinforcement Learning. Energies 2019, 12, 2829. [Google Scholar] [CrossRef]
  33. Serrano, W. Deep Reinforcement Learning Algorithms in Intelligent Infrastructure. Infrastructures 2019, 4, 52. [Google Scholar] [CrossRef]
  34. Adam, M.S.; Por, L.Y.; Hussain, M.R.; Khan, N.; Ang, T.F.; Anisi, M.H.; Huang, Z.; Ali, I. An Adaptive Wake-Up-Interval to Enhance Receiver-Based Ps-Mac Protocol for Wireless Sensor Networks. Sensors 2019, 19, 3732. [Google Scholar] [CrossRef] [PubMed]
  35. Bahbahani, M.S.; Alsusa, E. A Cooperative Clustering Protocol with Duty Cycling for Energy Harvesting Enabled Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 2018, 17, 101–111. [Google Scholar] [CrossRef]
  36. Nguyen, N.-T.; Liu, B.-H.; Pham, V.-T.; Liou, T.-Y. An Efficient Minimum-Latency Collision-Free Scheduling Algorithm for Data Aggregation in Wireless Sensor Networks. IEEE Syst. J. 2018, 12, 2214–2225. [Google Scholar] [CrossRef]
  37. Elshrkawey, M.; Elsherif, S.M.; Wahed, M.E. An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Networks. J. King Saud Univ. Comput. Inf. Sci. 2018, 30, 259–267. [Google Scholar] [CrossRef]
  38. Kaur, S.; Mahajan, R. Hybrid meta-heuristic optimization based energy efficient protocol for wireless sensor networks. Egypt. Inform. J. 2018, 19, 145–150. [Google Scholar] [CrossRef]
  39. Arora, V.K.; Sharma, V.; Sachdeva, M. A multiple pheromone ant colony optimization scheme, for energy-efficient wireless sensor networks. Soft Comput. 2019. [Google Scholar] [CrossRef]
  40. Arora, V.K.; Sharma, V.; Sachdeva, M. ACO optimized self-organized tree-based energy balance algorithm for wireless sensor network. J. Ambient Intell. Humaniz. Comput. 2019, 10, 4963–4975. [Google Scholar] [CrossRef]
  41. Rhim, H.; Tamine, K.; Abassi, R.; Sauveron, D.; Guemara, S. A multi-hop graph-based approach for an energy-efficient routing protocol in wireless sensor networks. Hum. Centric Comput. Inf. Sci. 2018, 8, 30. [Google Scholar] [CrossRef]
  42. Liu, F.; Wang, Y.; Lin, M.; Liu, K.; Wu, D. A Distributed Routing Algorithm for Data Collection in Low-Duty-Cycle Wireless Sensor Networks. IEEE Internet Things J. 2017, 4, 1420–1433. [Google Scholar] [CrossRef]
  43. Jiang, C.; Li, T.-S.; Liang, J.; Wu, H. Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks. Sensors 2017, 17, 1051. [Google Scholar] [CrossRef]
  44. Vijayalakshmi, K.; Manickam, J.M.L. A cluster based mobile data gathering using SDMA and PSO techniques in WSN. Clust. Comput. 2018, 22, 12727–12736. [Google Scholar] [CrossRef]

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.